Communication Theory of Secrecy Systems*

From MaRDI portal
Publication:3645296

DOI10.1002/j.1538-7305.1949.tb00928.xzbMath1200.94005OpenAlexW2109394932WikidataQ1053345 ScholiaQ1053345MaRDI QIDQ3645296

Claude Shannon

Publication date: 17 November 2009

Published in: Bell System Technical Journal (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x



Related Items

Adaptive chaotic maps and their application to pseudo-random numbers generation, Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications, Image encryption using \(q\)-deformed logistic map, A new fractional one dimensional chaotic map and its application in high-speed image encryption, Statistical test criteria for sensitivity indexes of image cryptosystems, Construction of one-way hash functions with increased key space using adaptive chaotic maps, Efficient quantum dialogue using a photon in double degrees of freedom, Algorithms for checking some properties of \(n\)-quasigroups, Feistel-inspired scrambling improves the quality of linear congruential generators, Construction of authentication codes based on orthogonal array and Latin square, Is it possible to reduce the sizes of stegomessages in associative steganography?, Image encryption based on 5D hyperchaotic system using hybrid random matrix transform, Counting active S-boxes is not enough, Randomized component based secure secret reconstruction in insecure networks, Improvement of information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom, Fast algebraic immunity of Boolean functions, Dynamic substitution based encryption algorithm for highly correlated data, Anamorphic encryption: private communication against a dictator, Cryptanalysis of a DNA-based image encryption scheme, The fast image encryption algorithm based on lifting scheme and chaos, Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map, Leveraging environmental correlations: the thermodynamics of requisite variety, Chaotic hash function based on circular shifts with variable parameters, On the relationship between resilient Boolean functions and linear branch number of S-boxes, A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\), Type-preserving matrices and security of block ciphers, Block encryption of quantum messages, Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack, Semi-quantum dialogue with Bell entangled states, More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd, Experimental realization of a highly secure chaos communication under strong channel noise, An improved efficient identity-based quantum signature scheme, A quantum key distribution routing scheme for hybrid-trusted QKD network system, Quantum secret sharing based on continuous-variable GHZ states, Mediated semi-quantum secure direct communication, An improved QKD protocol without public announcement basis using periodically derived basis, Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states, On the construction of involutory MDS matrices over \(\mathbb{F}_{2^m}\), Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom, On the group generated by the round functions of translation based ciphers over arbitrary finite fields, Latin squares over quasigroups, Associative steganography. Durability of associative protection of information, Improvement of quantum dialogue based on entanglement swapping and Hadamard operation via cavity QED, On some connections between statistics and cryptology, Some group-theoretical results on Feistel networks in a long-key scenario, Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud, Literature survey on nonlinear components and chaotic nonlinear components of block ciphers, Image encryption using finite-precision error, Quantum stream ciphers: impossibility of unconditionally strong algorithms, Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels, Universal homophonic coding scheme using differential encoding and interleaving, Shannon's random-cipher result and the generalized \(R\)-norm entropy of type \(\beta\), Outer-convex dominating set in the corona of graphs as encryption key generator, Matrices and graphs of essential dependence of proper families of functions, A cryptosystem based on cellular automata, Controlled bidirectional quantum secure direct communication with six-qubit entangled states, Controlled quantum dialogue with five-qubit entangled states, A novel hybrid secure confidentiality mechanism for medical environment based on Kramer's spin principle, A novel algorithm for image encryption based on mixture of chaotic maps, A novel heuristic method for obtaining \(S\)-boxes, An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps, A block cipher based on a suitable use of the chaotic standard map, Building blockcipher from small-block tweakable blockcipher, A new password authentication mechanism based on two phases encryption, A new chaotic algorithm for image encryption, Designing against a class of algebraic attacks on symmetric block ciphers, Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows, Hash Functions from Defective Ideal Ciphers, A privacy scheme for digital images based on quantum particles, Attainable unconditional security for shared-key cryptosystems, Secure information transfer based on computing reservoir, A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers, What is the Future of Cryptography?, A construction of novel chaos base nonlinear component of block cipher, A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud, Digital image scrambling based on a new one-dimensional coupled sine map, GLS coding based security solution to JPEG with the structure of aggregated compression and encryption, A chaotic image encryption scheme owning temp-value feedback, Identity-based quantum designated verifier signature, On privacy preserving data release of linear dynamic networks, Data driven computing with noisy material data sets, The elements of associative stegnanography theory, A controller-independent quantum dialogue protocol with four-particle states, A novel digital contents privacy scheme based on Kramer's arbitrary spin, Application based construction and optimization of substitution boxes over 2D mixed chaotic maps, Quantum encryption and generalized Shannon impossibility, RETRACTED: Fresnelet approach for image encryption in the algebraic frame, Cryptanalysis of Rijndael S-box and improvement, Quantum privacy and quantum wiretap channels, A note on two classes of Boolean functions with optimal algebraic immunity, Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes, Demonstration of the no-hiding theorem on the 5-qubit IBM quantum computer in a category-theoretic framework, Quantum multi-proxy strong blind signature based on block blind coding, Robust quantum dialogue based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state, Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map, Quantum permutation pad for universal quantum-safe cryptography, Formalization of Shannon's theorems, Analysis on security loophole of two-step efficient quantum dialogue with three-particle entangled W state, Codes for a generalized wire-tap channel model, The Vernam cipher is robust to small deviations from randomness, A symmetric image encryption scheme based on 3D chaotic cat maps, Invertible shift-invariant transformations on binary arrays, Ising game: nonequilibrium steady states of resource-allocation systems, An analysis of a class of algorithms for \(S\)-box construction, Algebraic nonlinearity and its applications to cryptography, Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio, Confidentiality and differential privacy in the dissemination of frequency tables, Analysis of the time series generated by a new high-dimensional discrete chaotic system, Semi-quantum dialogue based on single photons, The unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret key, A method to calculate differential uniformity for permutations, Shannon's random-cipher result and the R-norm information, Public-key quantum digital signature scheme with one-time pad private-key, A construction of a cipher from a single pseudorandom permutation., Is the data encryption standard a group? (Results of cycling experiments on DES), A construction for authentication/secrecy codes from certain combinatorial designs, A generalization of Hellman's extension of Shannon's approach to cryptography, Authentication codes in plaintext and chosen-content attacks, Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes, Mathematical problems in cryptology, Substitution-permutation networks resistant to differential and linear cryptanalysis, Secure image encryption algorithm design using a novel chaos based S-Box, Breaking a chaotic image encryption algorithm based on perceptron model, Illusory decoherence, Multi-party quantum secret sharing with the single-particle quantum state to encode the information, The simulation of random processes on digital computers with Chebyshev mixing transformations, A cryptographic system based on finite field transforms, Cartesian authentication codes from functions with optimal nonlinearity., Multiple-user communication, Integration of quantum key distribution and private classical communication through continuous variable, Feebly secure cryptographic primitives, Circuit complexity of linear functions: gate elimination and feeble security, An image encryption scheme based on quantum logistic map, Chaos-based cryptograph incorporated with \(S\)-box algebraic operation, Survey on hardware implementation of random number generators on FPGA: theory and experimental analyses, Bell state entanglement swappings over collective noises and their applications on quantum cryptography, Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement, Cryptanalysis of a new circular quantum secret sharing protocol for remote agents, Chaotic encryption using discrete-time synchronous chaos, Effect of Rayleigh fading on non-coherent sequence synchronization for multi-user chaos based DS-CDMA, Entropy dimension reduction method for randomized machine learning problems, An efficient diffusion scheme for chaos-based digital image encryption, On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions, Image encryption using the chaotic Josephus matrix, A time-luck tradeoff in relativized cryptography, Wave-shaped round functions and primitive groups, On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures, Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile, New bounds and constructions for authentication/secrecy codes with splitting, Polynomially complete quasigroups of prime order, From enumerating to generating: a linear time algorithm for generating 2D lattice paths with a given number of turns, Conditionally-perfect secrecy and a provably-secure randomized cipher, A data-driven smoothed particle hydrodynamics method for fluids, Fault tolerant authenticated quantum dialogue based on logical qubits and controlled-not operations, Randomized machine learning of nonlinear models with application to forecasting the development of an epidemic process, Properties of two Shannon's ciphers, Latin squares over Abelian groups, On the fractional-order extended Kalman filter and its application to chaotic cryptography in noisy environment, Image encryption with chaotically coupled chaotic maps, An RSA based public-key cryptosystem for secure communication, Cellular automata based S-boxes, Dirac-based reduction techniques for quantitative analysis of discrete-time Markov models, Robust reversible data hiding scheme based on two-layer embedding strategy, Quantum correlation with entanglement and mutual entropy, A novel method to identify initial values of chaotic maps in cybersecurity, A uniform-complexity treatment of encryption and zero-knowledge, Cascade ciphers: The importance of being first, Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis, New public-key quantum signature scheme with quantum one-way function, Aspects of the Clausius-Shannon identity: Emphasis on the components of transitive information in linear, branched and composite physical systems, A novel method for designing S-boxes based on chaotic maps, A method for designing dynamical S-boxes based on discretized chaotic map, On cryptographic properties of \((n+1)\)-bit S-boxes constructed by known \(n\)-bit S-boxes, Some graph-based encryption schemes, Construction of lightweight involutory MDS matrices, A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform, Placing conditional disclosure of secrets in the communication complexity universe, Information protection based on nanosecond synchronization of time scales in meteor burst channel, Group theoretic properties of Rijndael-like ciphers, The Oribatida v1.3 family of lightweight authenticated encryption schemes, Symmetry of information and one-way functions, A synthetic indifferentiability analysis of some block-cipher-based hash functions, Cryptology: The mathematics of secure communication, Secret sharing over infinite domains, Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer, Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles, Resilient output regulation in heterogeneous networked systems under Byzantine agents, Quantum uncertainty and the spectra of symmetric operators, On the impossibility of highly-efficient blockcipher-based hash functions, On the diffusion of the improved generalized Feistel, On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions, Chaotic image encryption design using Tompkins-Paige algorithm, Prediction, retrodiction, and the amount of information stored in the present, On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\), On complexity of round transformations, A friendly interference game in wireless secret communication networks, Indifferentiability for public key cryptosystems, Fast and secure updatable encryption, Probabilistic encryption, Connections among nonlinearity, avalanche and correlation immunity, Quantum authencryption with two-photon entangled states for off-line communicants, Stream/block ciphers, difference equations and algebraic attacks, Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties, How to build an ideal cipher: the indifferentiability of the Feistel construction, Involutory-multiple-lightweight MDS matrices based on Cauchy-type matrices, A framework to optimize implementations of matrices, Design of image cipher using Latin squares, Elements of randomized forecasting and its application to daily electrical load prediction in a regional power system, Markovian and non-Markovian quantum measurements, Generative adversarial networks-based pseudo-random number generator for embedded processors, An efficient quantum private comparison of equality over collective-noise channels, Unconditionally secure quantum signatures, Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation, On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity, Prospects of quantum-classical optimization for digital design, Error correcting codes, block designs, perfect secrecy and finite fields, A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity, A structure-based chaotic hashing scheme, Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption, Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure, Chaotic hash function based on the dynamic S-box with variable parameters, A chaotic map-control-based and the plain image-related cryptosystem, On cross-correlation indicators of an S-box, Nonlinearities of S-boxes, Quantum dialogue protocols immune to collective noise, Exploiting randomness on continuous sets, Image security system using recursive cellular automata substitution, Permutation and sampling with maximum length CA or pseudorandom number generation, New field of cryptography: DNA cryptography, An information-theoretic model for steganography, Combinatorial bounds and characterizations of splitting authentication codes, Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels, Applications of tripled chaotic maps in cryptography, A chaos-based image encryption algorithm with variable control parameters, Hash function based on piecewise nonlinear chaotic map, Color image encryption based on one-time keys and robust chaotic maps, An analysis of the blockcipher-based hash functions from PGV, A formal analysis of information disclosure in data exchange, Exploring confusion in product ciphers through regression analysis, Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications, Secure communication in the twin paradox, One-time pads cannot be used to improve the efficiency of quantum communication, Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model, Jarzynski-type equalities in gambling: role of information in capital growth, A secure image encryption algorithm based on Rubik's cube principle, A method for designing strong S-Boxes based on chaotic Lorenz system, Resource requirements of private quantum channels and consequences for oblivious remote state preparation, Image encryption using DNA addition combining with chaotic maps, Keyed hash function based on a chaotic map, Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation, (Secure) linear network coding multicast, A novel image encryption algorithm based on a 3D chaotic map, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, Comment on: ``Three-party quantum secure direct communication based on GHZ states, Modified Baptista type chaotic cryptosystem via matrix secret key, The combinatorics of authentication and secrecy codes, One-time pad as a nonlinear dynamical system, A fast software one-way hash function, Enumerating Boolean functions of cryptographic significance, Quantum key agreement against collective decoherence, The structured design of cryptographically good s-boxes, Estimation of characteristics of randomized static models of data (entropy-robust approach), A parallel encryption algorithm based on piecewise linear chaotic map, Using quantum key distribution for cryptographic purposes: a survey, Authentication codes and bipartite graphs, A chaos-based approach to the design of cryptographically secure substitutions, Security risk during the transient in a key exchange protocol using random signals and feedback, Error-correcting codes and cryptography, Enhanced Boolean functions suitable for the filter model of pseudo-random generator, Hyperchaotic encryption based on multi-scroll piecewise linear systems, Security of public key encryption technique based on multiple chaotic systems, Differentially 4-uniform bijections by permuting the inverse function, A new discrete chaotic map based on the composition of permutations, Cryptanalysis of an image encryption scheme based on the hill cipher, Privacy protection in on-line shopping for electronic documents, A novel keyed parallel hashing scheme based on a new chaotic system, Towards a general construction of recursive MDS diffusion layers, Optimal symmetric ternary quantum encryption schemes, On functional specification of Latin squares, Authenticated key agreement in dynamic peer groups, Analysis and improvement of a hash-based image encryption algorithm, Universal codes as a basis for time series testing, Exposed-key weakness of \(\alpha \eta \), Arithmetic coding as a non-linear dynamical system, A block cipher with dynamic S-boxes based on tent map, Analysis and improvement of a chaos-based hash function construction, An improved chaotic cryptosystem with external key, Image encryption using chaotic coupled map lattices with time-varying delays, A chaotic block cipher algorithm for image cryptosystems, A fast image encryption and authentication scheme based on chaotic maps, An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach, An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher, On integrating confidentiality and functionality in a formal method, Ping-pong protocols as prefix grammars: modelling and verification via program transformation, Decrypting classical cipher text using Markov chain Monte Carlo, Wavelet packet transform-based robust video watermarking technique, Fault-tolerant authenticated quantum dialogue using logical Bell states, Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic, A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks, Key variation technique based on piggybacking strategies under public key environments, SPF-CA: A new cellular automata based block cipher using key-dependent S-boxes, A novel image encryption algorithm based on chaotic billiards, On differential uniformity of permutations derived using a generalized construction, Group ring based public key cryptosystems, A DSA-like digital signature protocol, Efficient Region of Interest Encryption Based on a New Chaotic Map, Quantum cryptography and security analysis, Fundamental problems in provable security and cryptography, SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR, Analysis of bitsum attack on block ciphers, SYNCHRONIZATION OF CHUA CHAOTIC CIRCUITS WITH APPLICATION TO THE BIDIRECTIONAL SECURE COMMUNICATION SYSTEMS, Chaotic trigonometric Haar wavelet with focus on image encryption, Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes, Computer cryptographic techniques for processing and storage of confidential information†, A secure image cryptosystem via multiple chaotic maps, Unnamed Item, Unconditionally secure short key ciphers based on data compression and randomization, Simulation of QTRNG on IBM's Q experience using rotation and phase quantum gates, A semi-quantum private comparison with high-level security third party, Indifferentiability of the confusion-diffusion network and the cascade block cipher, A further study on bridge structures and constructing bijective S-boxes for low-latency masking, A note on semi-orthogonal (G-matrix) and semi-involutory MDS matrices, Decidable characterizations of dynamical properties for additive cellular automata over a finite abelian group with applications to data encryption, Enhanced design and hardware implementation of a chaos-based block cipher for image protection, Quantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall Game, Private disclosure with multiple agents, Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement, An uncertainty measure based on Pearson correlation as well as a multiscale generalized Shannon-based entropy with financial market applications, Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation, Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls, Randomized half-ideal cipher on groups with applications to UC (a)PAKE, A cryptographic and coding-theoretic perspective on the global rules of cellular automata, Entanglement and Entropic Uncertainty of Two Two‐Level Atoms, Randomized machine learning algorithms to forecast the evolution of thermokarst lakes area in permafrost zones, Construction of recursive MDS matrices using DLS matrices, The physical foundation of quantum theory, Distortion-based state security codes for distributed sensor networks, Role of Steering Inequality in Quantum Key Distribution Protocol, Протоколы дистанционного голосования. I;Remote voting protocols. I, A New Design of Substitution Box with Ideal Strict Avalanche Criterion, Heuristic search of (semi-)bent functions based on cellular automata, PAC privacy: automatic privacy measurement and control of data processing, Sequential indifferentiability of confusion-diffusion networks, A quantum dialogue reduced by half unitary operations, Lifting standard model reductions to common setup assumptions, Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers, Practical demonstration of quantum key distribution protocol with error correction mechanism, Can language models automate data wrangling?, A novel stream encryption scheme with avalanche effect, An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain, Discussion on the initial states of controlled bidirectional quantum secure direct communication, A comprehensive review of quantum random number generators: concepts, classification and the origin of randomness, Efficient fault-tolerant quantum dialogue protocols based on dictionary encoding without decoy photons, Further insights on constructing quantum circuits for Camellia block cipher, Semi-quantum designated verifier signature scheme, Construction of nonlinear component based on bent Boolean functions, On elliptic curve $L$-functions integrated encryption scheme, Unnamed Item, Cryptography and cryptographic protocols, Loss-tolerant measurement-device-independent quantum random number generation, A new spatiotemporally chaotic cryptosystem and its security and performance analyses, Public-key encryption with chaos, Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks, SOME METHODS FOR CONSTRUCTING MDS-MATRICES OVER FINITE FIELD, Атака на ГОСТ с уменьшенным числом итераций методом согласования, Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps, QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION, A SELECTIVE IMAGE ENCRYPTION BASED ON COUPLE SPATIAL CHAOTIC SYSTEMS, Obituary: Claude Elwood Shannon 1916-2001, THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT, Chasing Diagrams in Cryptography, Some results onq-ary bent functions, Use of chaotic dynamical systems in cryptography, Xor-Implications and E-Implications: Classes of Fuzzy Implications Based on Fuzzy Xor, Permutation polynomials modulo \(2^w\), Logistic map as a block encryption algorithm, Unnamed Item, The communication complexity of private simultaneous messages, revisited, Algebraic Cryptanalysis of the Data Encryption Standard, Randomness and Representation of Span n Sequences, Biunitary constructions in quantum information, The Tiny Encryption Algorithm, Unnamed Item, Dispelling myths on superposition attacks: formal security model and attack analyses, Secure Communication Systems Based on the Synchronization of Chaotic Systems, STEPS TOWARDS CRYPTANALYSIS OF CHAOTIC ACTIVE/PASSIVE DECOMPOSITION ENCRYPTION SCHEMES USING AVERAGE DYNAMICS ESTIMATION, ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS, Randomness measures related to subset occurrence, Unnamed Item, 3D: A Three-Dimensional Block Cipher, A Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic System, Decoy-state quantum key distribution with a leaky source, Characterization for entropy of shifts of finite type on Cayley trees, Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction, Optimal potentials for diffusive search strategies, Quantum Authentication with Key Recycling, A new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communication, Variation and security enhancement of block ciphers by embedding, A novel image encryption scheme with adaptive Fourier decomposition, A secure image encryption algorithm based on a parametric switching chaotic system, CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOLS WITH EIGHT-STATE DISCRETE MODULATION, Cryptographic Analysis of All 4 × 4-Bit S-Boxes, On the optimality of quantum encryption schemes, A method of eliminating information disclosure in view publishing, Multiple Usage of Random Bits in Finite Automata, Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes, On Entropy, Information Inequalities, and Groups, The Whirlpool Secure Hash Function, Solving the Running Key Cipher with the Viterbi Algorithm, A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization, Simultaneous Secrecy and Reliability Amplification for a General Channel Model, The Iterated Random Permutation Problem with Applications to Cascade Encryption, On the Diffusion Property of Iterated Functions, An Epistemological Approach to Steganography, The Multics encipher_Algorithm, A Simplified IDEA Algorithm, Basics of Secrecy Coding, Isomorphism classes of authentication codes, Turing, ciphers and quanta, A new random number generator from permutation groups, Counterfactual quantum cryptography network with untrusted relay, Unnamed Item, A Conceptual Framework for Secrecy-preserving Reasoning in Knowledge Bases, Algebraic Attacks Using Binary Decision Diagrams, Gambling, Computational Information and Encryption Security, Mechanism design and communication networks, Information Theoretic Security for Encryption Based on Conditional Rényi Entropies, REVISITING Xor-IMPLICATIONS: CLASSES OF FUZZY (CO)IMPLICATIONS BASED ON f-Xor (f-XNor) CONNECTIVES, N-gram-based Machine Translation, Computational Security of Quantum Encryption, Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers, Complexity of combinatorial optimization problems in terms of face lattices of associated polytopes, Algebraic Attacks against Random Local Functions and Their Countermeasures, A Novel Digital Image Encryption Algorithm Based on Orbit Variation of Phase Diagram, CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS, Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features, Not all (possibly) “random” sequences are created equal, Unnamed Item, SECURITY OF QUANTUM KEY DISTRIBUTION, COMPLEXITY, INFORMATION, ENERGY, Unnamed Item, ON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHY, A Novel Quasigroup Substitution Scheme for Chaos Based Image Encryption, Perfect nonlinear S-boxes on the real-line, The design of the ICE encryption algorithm, CS-Cipher, Lightweight MDS Generalized Circulant Matrices, Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna, On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes, The global avalanche characteristics of two Boolean functions and algebraic immunity, Gate Elimination for Linear Functions and New Feebly Secure Constructions, Algebraic Attacks on the Courtois Toy Cipher, ABSOLUTELY SECURE MESSAGE TRANSMISSION USING A KEY SHARING GRAPH, Doubly perfect nonlinear boolean permutations, FAST, PARALLEL AND SECURE CRYPTOGRAPHY ALGORITHM USING LORENZ'S ATTRACTOR, On Hiding a Plaintext Length by Preencryption, FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES, Fast Correlation Attacks: Methods and Countermeasures, A NOVEL ALGORITHM FOR IMAGE ENCRYPTION BASED ON COUPLE CHAOTIC SYSTEMS, TIGHTENING THE EAVESDROPPING ACCESSIBLE INFORMATION FOR CONTINUOUS VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOLS THAT INVOLVE NONMAXIMALLY ENTANGLEMENT, SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS, Unnamed Item, [https://portal.mardi4nfdi.de/wiki/Publication:3850261 Nachrichten�bertragung und Nachrichtenverarbeitung (Neue gedankliche Werkzeuge)], Two phases encryption and its applications, Communication-Based on Topology Preservation of Chaotic Dynamics, Symmetric Ciphers Based on Two-Dimensional Chaotic Maps, Language Modeling and Encryption on Packet Switched Networks, The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity, OAEP Is Secure under Key-Dependent Messages, On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations, A Less Known Side of Quantum Cryptography, A first study of improving transposition cryptosystem, CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS, Meet-in-the-Middle Attacks on Reduced-Round XTEA, Construction of Lightweight S-Boxes Using Feistel and MISTY Structures, О построении совершенных шифров, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, New classes of $8$-bit permutations based on a butterfly structure, Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment, The Latin squares and the secret sharing schemes, Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, A New Hypersensitive Hyperchaotic System with No Equilibria, Generation of solved instances of Multiconstraint Knapsack problem and its applications to Private Key Cipher, IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS, Pen and Paper Arguments for SIMON and SIMON-like Designs, Unnamed Item, Constructions ofq-ary functions with good global avalanche characteristics, Practical Algebraic Attacks on the Hitag2 Stream Cipher, An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis, On the longest run of coincidences, Linear codes from vectorial Boolean functions in the context of algebraic attacks, Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators, On the Power of Cascade Ciphers, A Layered Broadcast Cryptographic System, Analytical Characteristics of the DES, Some Results on the Information Theoretic Analysis of Cryptosystems, The Many Entropies in One-Way Functions, Cryptanalysis of ITRU, Unnamed Item